DIGITS LLC Launches ROVR CaseMan as a Case Management Solution

A new case management solution called ROVR CaseMan has been launched by DIGITS LLC at the 2013 HTCIA International Conference, and is now available for purchase to the public.

ROVR CaseMan’s software works for professionals in the legal and consulting fields.  This case management solution was designed by consultants, who face the daunting tasks of managing time, expenses and clients while tracking important business data from case initiation through conclusion.  ROVR CaseMan is used by consultants and Private Investigators as a whole case management solution to simplify and track their business process.

ROVR CaseMan is completely customizable.  Information gathered from the reporting features is displayed in easy to read widgets.  All reports and widgets can be modified to meet the needs of your organization.  Some of the current widgets within CaseMan include the following areas: Conflict Checks, Evidence Inventory (Full Chain of Custody), Projects, Invoices , Firm/Party , Payroll, Estimates By Project Status, Revenue Report, Time Management, Employee Utilization, Un-Invoiced Estimate, and Custom Reports.

For additional information about ROVR CaseMan, to request a free trail or view a demonstration of the case management software, please visit www.rovrcaseman.com or call 877-476-4447 to speak with a sales representative.

ROVR CaseMan was developed to fill the need of professionals in the legal and consulting fields.  ROVR CaseMan is designed to manage time, expenses and clients while tracking important business data from case initiation through conclusion. — www.rovrcaseman.com

DIGITAL FORENSIC EXAMINERS OPEN OFFICES IN TWO NEW MARKETS

DIGITS LLC Digital Forensics Buffalo, N.Y. — Premier digital forensic experts, DIGITS LLC, have opened additional offices in Rochester, New York and Cleveland, Ohio.  DIGITS LLC provides digital forensic services to fill the need in the legal and corporate communities.

“Our new offices in Rochester and Cleveland will help DIGITS LLC to better meet the needs of our clients and help them respond to corporate compliance challenges, litigation, and stay more secure from the ever-changing cyber threats corporate America faces every day,” said Michael McCartney, President/CEO, DIGITS LLC.  “We feel that our presence in these cities will help to bring additional awareness of the significant corporate risks effecting business owners.”

Founded in 2006 and headquartered in Buffalo, N.Y., DIGITS LLC is an internationally recognized firm specializing in digital forensics, data recovery, corporate computer investigations, network security advisory services and litigation support services.  DIGITS LLC’s core business is designed to help our clients take full advantage of today’s information technologies while guarding against the ever-changing threats posed by those very technologies.  DIGITS LLC officers have over 115 years of combined law enforcement experience and decades of experience in Computer Forensics and advanced technology investigations. http://www.digitsllc.com.

Congratulations Buffalo 612′ C-Level Executives

Today Buffalo’s top C-Level Executives were recognized at the Buffalo Business First 612′ Award.  A luncheon ceremony was help at Salvatore’s Italian Gardens Restaurant as each of the honored executives were featured for their great successes.  DIGITS LLC is very honored to say congratulations to President/CEO, Michael McCartney, for his achievements in receiving this award.  We would also like to congratulate all of the top C-Level Executives from Buffalo that were also recognized for their great achievements! Job well done!

 

www.digitsllc.com

‘Computer Forensic 101: Proactive Compliance’ with The IIA

To Register for this event, visit http://www.theiia.org/chapters/index.cfm/view.events/cid/24.
The cost of the seminar is $20 for members, $30 for non-members, $15 for students.
Email michael.mccartney@digitsllc.com or kelly.merz@digitsllc.com with any questions.

www.digitsllc.com

Expanding Computer Forensics Knowledge

By: Kyle Cavalieri, Manger of Computer Forensics and Investigations, DIGITS LLC

Recently we had an inquiry from a follower who recently obtained a computer forensics certification from an online resource. Our follower asked if we recommend that they take a course involving more hands on experience?

Mr. Cavalieri’s response:

Hands on experience is a MUST.  I would recommend any of the SANS DFIR courses for instructor led training courses.  If cost is an issue, I would highly recommend attending conferences and webinars to fill in the void of what was taught in the classroom to what is practice in the field.  I believe the SIFT Workstation (running on Ubuntu) created by Rob Lee (SANS Faculty Fellow) is free to SANS members (membership is free).  He has a wealth of great tools installed on the SIFT Workstation and there is plenty of documentation available to guide the user through the use of the tool(s).

I would highly recommend purchasing textbooks in the specialty areas he or she wants to dive into.  I think its a necessity to have File System Forensic Analysis by Brian Carrier and Windows Network Forensics and Investigation by Steve Anson and Steve Bunting in any Forensic Examiner’s library.

At the end of the day, any good examiner needs to be proactive and test new systems and determine how to find those valuable forensic artifacts that may make or break your investigation.

If you have any other questions, please feel free to contact us at info@digitsllc.com.  Stay connected!

www.digitsllc.com
Facebook
LinkedIn
Twitter

Case Study: Digital Forensic Investigation on Deleted Information

It took a lot of hard work to build you company, equipping it with the latest technology and hand picking your staff.  You would do anything to make revenues grow and profits to increase. And almost anything to to protect it.  It may come to you as a surprise, but possibly the greatest threat does not come from outside your company, but from inside your company.  With all of the technology available and the number of employees, it is possible to be vulnerable to attack from within.

Think for a minute, has this happened to you?

Your computers combined with the internet is a powerful tool, used for good and bad.  The ‘delete’ key can correct mistakes or hide wrong doing.  I promise you, if an employee is doing bad, it is not on the company email.  They used out of band email, such as Hotmail or Gmail, and they think it is deleted when they log off.  They have not deleted it, it still exists.

At DIGITS LLC, we are consistently asked if the data exists in various locations.  Often times, we will get a case that originated from the company and the company’s I.T. department. Only to find out that the data has not been deleted- that it actually exists in multiple locations, both on the devises (laptops, smartphones, other network files shares).  Also, third party locations.  We are able to determine and assist clients in determining where their data really lives.  This is critically important in the areas of litigation.  When a company has been served with a litigation hold or recently served with a sapeina, a regulatory compliance seponia, or a lawsuit requesting that certain electronically stored information to be collected, preserved and ultimately produced.

We work with clients regularly to identify where that data is.  Either within their four walls or at some third party location.  We assist our client to properly collect, preserve,and ultimately examining and producing that data which is relevant to their litigation.

These are cases that DIGITS LLC can lend a tremendous amount of value to. We can forensically analyze the laptops, the desktops, the smartphones, as well as the out of band email communications that are taking place between the employee and the outside entities to determine what is really going on.  In Computer Forensics, we can dig deep and find out what your employees are doing.  We can also conduct high level investigations if you have been violated, or think you have been.

Your I.T. person might be the first person to notice that something suspicious has happened.  When they inform you, your first inclination will be to have the I.T. person investigate the problem- this could be the worst possible thing you could do. I.T. professionals are not forensic experts.  They do not use the same tools or have the same certifications that forensic experts hold.  I.T. treats data as data. At DIGITS LLC we treat data as evidence.  If the I.T. professional goes into the electronic devise and damages the evidence, it will be difficult to prove in a court of law, because things change.

When DIGITS LLC completes an investigation, you will have a report that is a thorough and complete depiction, in which your legal team can proceed.  If a problem is detected, DIGITS LLC can get to the bottom of it.  We can stand as an expert witness in the case of litigation.  We can advise your company on proactive prevention and compliance with policies and procedures.

If you find yourself involved with litigation, a regulator compliance matter, give DIGITS LLC a call.  We have assisted clients negate these matters and consulted them with the proper evidence collection, preservation, examination, and production of this information that is relevant specifically to their case.  We can help solve your problem.  DIGITS LLC has done it with over 115 years of law enforcement, decades of experience with digital forensics and advanced technology investigations.  We have been on some of the largest high profile investigations in the country and we can do it for you.  Not only can we help you solve an immediate problem as a reactive approach, but we can also assist you proactively manage and mitigate your risk moving forward so that you can identify issues and deal with those issues before they become a problem.

For additional information, visit our website www.digitsllc.com or call us at 877-216-2511.

Computer Forensics 101: Proactive Compliance with The Institute of Internal Auditors

The Institute of Internal Auditors

Thursday, September 13, 2012

“Computer Forensics 101: Proactive Compliance’
Presented by Michael McCartney, President & CEO of DIGITS LLC.

Cost of the seminar is $20 for members, $30 for non-members, and $15 for students.

Date: Thursday, September 13, 2012
Time: 12:00 to 1:30p.m.
Location: Chef’s Restaurant, 291 Seneca Street, Buffalo, New York 14204
RSVP: By end of the day on Friday, September 7, 2012

To register for this event, please follow this link.  http://www.theiia.org/chapters/index.cfm/view.event_detail/cid/24/event_id/19119

Case Study: Digital Forensic Investigation on Corporate Espionage

It took a lot of hard work to build you company, equipping it with the latest technology and hand picking your staff.  You would do anything to make revenues grow and profits to increase. And almost anything to to protect it.  It may come to you as a surprise, but possibly the greatest threat does not come from outside your company, but from inside your company.  With all of the technology available and the number of employees, it is possible to be vulnerable to attack from within.

Think for a minute, has this happened to you? Maybe you discover that an idea of your is suddenly being promoted by your competitor.  The details indicate that it came from within your company- How do you find out, with Computer Forensics! DIGITS LLC has investigated several high profile corporate espionage investigation cases.

A typical senerio: A company has a specific product or proprietary service offered in a marketplace.  You begin to look for private equity investment to take your product or service to the next level.  During the course of those negotiations and investment strategy, you take on a new employee who has been recommended by the investment firm.  The employee is sworn to them. But as a part of the deal, the employee comes with the package.

That employee turns out to be a mole, or co-conspirator, and is particularly planted into that organization for the purposes of gathering inside information, intelligence, and ultimately the inside information that relates to the products propitiatory process.

These are cases that DIGITS LLC can lend a tremendous amount of value to. We can forensically analyze the laptops, the desktops, the smartphones, as well as the out of band email communications that are taking place between the employee and the outside entities to determine what is really going on.  In Computer Forensics, we can dig deep and find out what your employees are doing.  We can also conduct high level investigations if you have been violated, or think you have been.

Your I.T. person might be the first person to notice that something suspicious has happened.  When they inform you, your first inclination will be to have the I.T. person investigate the problem- this could be the worst possible thing you could do. I.T. professionals are not forensic experts.  They do not use the same tools or have the same certifications that forensic experts hold.  I.T. treats data as data. At DIGITS LLC we treat data as evidence.  If the I.T. professional goes into the electronic devise and damages the evidence, it will be difficult to prove in a court of law, because things change.

When DIGITS LLC completes an investigation, you will have a report that is a thorough and complete depiction, in which your legal team can proceed.  If a problem is detected, DIGITS LLC can get to the bottom of it.  We can stand as an expert witness in the case of litigation.  We can advise your company on proactive prevention and compliance with policies and procedures.

If you find yourself involved with litigation, a regulator compliance matter, give DIGITS LLC a call.  We have assisted clients negate these matters and consulted them with the proper evidence collection, preservation, examination, and production of this information that is relevant specifically to their case.  We can help solve your problem.  DIGITS LLC has done it with over 115 years of law enforcement, decades of experience with digital forensics and advanced technology investigations.  We have been on some of the largest high profile investigations in the country and we can do it for you.  Not only can we help you solve an immediate problem as a reactive approach, but we can also assist you proactively manage and mitigate your risk moving forward so that you can identify issues and deal with those issues before they become a problem.

For additional information, visit our website www.digitsllc.com or call us at 877-216-2511.

DIGITS LLC | Digital Forensics Video Case Studies

Experts at DIGITS LLC use digital forensics to obtain evidence when litigation occurs.  It is important to ensure that the electronic evidence is not disturbed by an in-house IT department or other resource before the data is collected and the devise is wiped clean of any information.  Once the data is collected, DIGITS LLC’s computer forensic experts will preserve then process the data.  Digital forensics can be used proactively to mitigate and manage digital processes occurring when laptops, desktops and cell phones are distributed for business purposes.

DIGITS LLC have put together video segments explaining just a segment of the digital forensic services we provide through different case studies.  Click on each of the links below to see how computer forensics can help you!

Digital Forensic Video Case Studies:

Digital Forensics to Solve Sexual Harassment Cases
Digital Forensics to Solve Corporate Espionage Lawsuits
Digital Forensics to Solve Theft of Intellectual Property Cases
Digital Forensics to Solve Workers Compensation Lawsuits
Digital Forensics to Recover Deleted Data
Digital Forensics to Solve Cases Regarding Removal of External Storage

For any additional information about Digital Forensics or the services that DIGITS LLC provides, please email info@digitsllc.com

#StaySecure from GPU cracking passwords

Earlier this week we posted an article about the Extreme GPU Bruteforcer – a devices that will “Crack passwords w/ 450 Million passwords/Sec Speed“.  A device that is threatening to many.

Our advice to #staysecure

Create alphanumeric passwords.  Your password should contain:

  • Symbols
  • Lower and upper case letters
  • More than 10 characters in length

Any kind of password can be broken using brute force.  However, using the character sequence above, it will take a long time to finish.  Cyber crooks tend to look for quick brake-ins compared to complex.